Cryptology ePrint Archive: Report 2009/314

Available versions in chronological order


Secure Two-Party Computation is Practical
B. Pinkas and T. Schneider and N.P. Smart and S. Williams

Secure Two-Party Computation is Practical
B. Pinkas and T. Schneider and N.P. Smart and S. Williams


[ Cryptology ePrint archive ]